CN105451224B - Destroying method - Google Patents
Destroying method Download PDFInfo
- Publication number
- CN105451224B CN105451224B CN201410406620.5A CN201410406620A CN105451224B CN 105451224 B CN105451224 B CN 105451224B CN 201410406620 A CN201410406620 A CN 201410406620A CN 105451224 B CN105451224 B CN 105451224B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- imsi
- broadcast
- imei
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention relates to a kind of destroying method, method includes:After user is successfully logged in for the first time by mobile terminal, IMEI and IMSI are stored in local, and the first broadcast is added in alarm clock management timer and is broadcasted;It is set as true by variable is successfully logged in;The radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;Radio receiver receives the booting self-starting broadcast of system transmission;Judge successfully to log in whether variable is true, then sends the second broadcast in this way;When radio receiver receives the second broadcast, SIM is monitored;Such as None- identified to SIM or the 2nd IMEI and the first IMEI is inconsistent or the 2nd IMSI and the first IMSI is inconsistent, is destroyed.The destroying method of the present invention can be carried out easily using local detection from destruction, or started using server side and destroyed, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.
Description
Technical field
The present invention relates to information security field more particularly to a kind of destroying methods.
Background technology
With the development of the times, information technology is maked rapid progress, and demand of the people to information is also increasing.And in informationization
Society in, the importance and economic value of information are also higher and higher.
But therefore information security issue also generates, particularly with the high industry of some security requirements or field, work as institute
The mobile terminal loss used is found by people may lead to the problem of information loss and divulge a secret.
Invention content
It is uneasy when finding to realize the purpose of the present invention is in view of the drawbacks of the prior art, providing a kind of destroying method
When full situation, startup is destroyed, and can effectively prevent information leakage.
To achieve the above object, the present invention provides a kind of destroying method, the method includes:
After user is successfully logged in for the first time by mobile terminal, by First International's mobile device identification code of the mobile terminal
IMEI and First International mobile identification number IMSI is stored in local, and the first broadcast is added to alarm clock management
In AlarmManager timers and broadcast first broadcast;Variable, which will be successfully logged in, when user is switched on is set as true;
The radio receiver of mobile terminal receives first broadcast, starts the service of destruction;
After booting, the radio receiver receives the booting self-starting broadcast of system transmission;
Judge whether the successfully login variable is true, then sends the second broadcast in this way;
When the radio receiver receives second broadcast, client identification module SIM in the mobile terminal is monitored;
If None- identified is to the SIM, or the 2nd IMEI of the mobile terminal that gets and locally preserves
First IMEI is inconsistent, or the 2nd IMSI got and the inconsistent then described shiftings of the first IMSI locally preserved
Dynamic terminal is destroyed.
It is further, described that then the second broadcast of transmission specifically includes in this way:Second broadcast is added to alarm clock management
In, second broadcast is sent with first time interval.
Further, the mobile terminal destroy specifically including:The letter that the mobile terminal will be preserved locally
Breath is deleted.
Further, the method further includes:The mobile terminal is true by traffic sign placement is destroyed, and when will destroy
Between be sent to the server.
The present invention also provides a kind of destroying method, the method includes:
Server receives destruction and asks and preserve in lists, and the destruction request includes User ID, the user
ID is bound with user password, IMIS and IMEI phases;
Mobile terminal judges that it is no to destroy mark, sends to the server and destroys query messages, the destruction inquiry disappears
Breath includes the first IMSI and the first IMEI of the mobile terminal;
The server searches bound User ID according to the first IMSI and the first IMEI;
The server finds first User ID in the list, the user that will be preserved in the list
Corresponding 2nd IMSI of ID, and encrypted 2nd IMSI is sent to the mobile terminal;
The mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then institute
Mobile terminal is stated to be destroyed.
Further, the server receives destruction and asks and further include after preserving in lists, by the user
ID is set as destruction state.
Further, the first IMSI and the first IMEI for destroying the mobile terminal that query messages include is specific
For encrypted first IMSI and encrypted first IMEI.
According to the method described in claim 5, it is characterized in that, the server is according to the first IMSI and first
IMEI further includes whether legal verifying the first IMSI and the first IMEI before searching bound User ID.
Further, the mobile terminal destroy specifically including:The letter that the mobile terminal will be preserved locally
Breath is deleted.
Further, the method further includes:The mobile terminal is true by traffic sign placement is destroyed, and when will destroy
Between be sent to the server.
The destroying method of the present invention can be carried out easily using local detection from destruction, or be started using server side
It destroys, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.
Description of the drawings
Fig. 1 is the flow chart of inventive pin damage method embodiment one;
Fig. 2 is the flow chart of inventive pin damage method embodiment two.
Specific implementation mode
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
The destroying method of the present invention is exactly the safety for ensureing user information using auto-destruct or remote destroying, is prevented
Mobile terminal causes the accidental release of information after losing.
There are two types of tupe, the first patterns to be bound suitable for terminal for present invention tool, and user successfully logs in for the first time
After terminal software, equipment international mobile subscriber identity (International Mobile are obtained
SubscriberIdentification Number, IMSI), international mobile equipment identification number (International Mobile
EquipmentIdentification Number, IMEI) it information and is stored in SharedPreferences.Destroy service
According to having preserved facility information and existing equipment IMEI, IMSI are compared when operation, it is determined whether need to destroy.
Fig. 1 is the flow chart of inventive pin damage method embodiment one, as shown, the present embodiment specifically includes following step
Suddenly:
Step 101, after user is successfully logged in for the first time by mobile terminal, by the first IMEI of mobile terminal and the first IMSI
It is stored in local;And the first broadcast is added in alarm clock management AlarmManager timers and is broadcasted;
Step 102, it will successfully log in variable and be set as true;
Step 103, the radio receiver of mobile terminal receives the first broadcast, starts the service of destruction;
Specifically, when user successfully logs in for the first time, IMSI, IMEI information preservation of equipment are existed
In SharedPreferences, while the variable successedLogin that will be indicated as the logged software of work(is set as true.With
After the first time manual entry success of family, the first broadcast Constants.ACTION_ACTIVATE_DESTROY is added to alarm clock
It manages in AlarmManager, and the broadcast is constantly sent with the 120 seconds time of interval, radio receiver receives first broadcast
Afterwards, start the service of destruction immediately.
Step 104, after booting, radio receiver receives the booting self-starting broadcast of system transmission;
Step 105, judge successfully to log in whether variable is true, then send the second broadcast in this way;
Specifically, mobile terminal is switched on again later, then receiving booting self-starting using radio receiver broadcasts, i.e.,
Android.intent.action.BOOT_COMPLETED broadcast, first determine whether variable successedLogin value whether be
Second broadcast is just that Constants.ACTION_ACTIVATE_DESTROY is added to alarm clock pipe if meeting condition by true
It manages in AlarmManager, and the broadcast is constantly sent with first time interval, such as 120 seconds time.
Step 106, when radio receiver receives the second broadcast, client identification module in mobile terminal is monitored
(Subscriber Identity Module, SIM);
Specifically, after radio receiver receives the second broadcast, starts the service of destruction immediately, monitor the state of SIM card.
Step 107, it if None- identified is to SIM, or the 2nd IMEI of the mobile terminal got and locally preserves
First IMEI is inconsistent, or the 2nd IMSI got and the inconsistent then mobile terminals of the first IMSI that locally preserve are into marketing
Ruin processing.
Specifically, if None- identified to SIM card, e.g. without SIM card state, or has SIM card state, but obtain
To the first IMSI that is preserved with SharedPreferences of the 2nd IMSI or the 2nd IMEI information or the first IMEI information differ
It causes, is switched on and destroys certainly.
The information deletion that exactly will locally preserve is destroyed, such as deletes the information in database file, is emptied
All variables (including user account, password, IMEI, IMSI, setting option) that SharedPreferences is preserved, then by pin
It ruins mark destroy and is set as true, be saved into SharedPreferences.
If network is normal, the software destruction time is sent to server.Current process is killed, and be currently running
View layers, service layer processes.
If next time wishes to log on, it can prompt that " software self-destruction, is reinstalled after please unloading!",
It will be unable to enter this application, software is forbidden to use.
Second of tupe of the present invention is bound suitable for server end:Server end typing user information when
It waits, User ID, password, IMSI, IMEI is bound, when having remote destroying request, can be gone to look into according to IMSI, IMEI
The user that needs are destroyed is looked for, corresponding destroy then is carried out and operates.
Fig. 2 is the flow chart of inventive pin damage method embodiment two, as shown, the present embodiment specifically includes following step
Suddenly:
Step 201, server receives destruction and asks and preserve in lists, and it includes User ID, user to destroy request
ID is bound with user password, IMIS and IMEI phases;
Specifically, if having destruction to require the user of some binding, the user is chosen in dispatching desk, sends to destroy and ask
It asks CC2SS_KILL_USR_REQ to server, destroys request and carry destroyed User ID.
After server receives the destruction request of dispatching desk, the PTT_HEAP.ZXYongHu_Record in these three tables,
PTT_HEAP.YongHu_Record, PTT_DISK.YongHu_Info find the user, and the destruction shape of the user is arranged
State.
Step 202, mobile terminal judges that it is no to destroy mark, sends to server and destroys query messages, destroys inquiry and disappear
Breath includes the first IMSI and the first IMEI of mobile terminal;
Specifically, after terminal starts the service of destruction, if it is false to destroy mark destroy, with first time interval,
Such as sent to server within 120 seconds and destroy query messages inquiry whether there is or not destroying to require, the destruction query messages of transmission include first
IMSI information and the first IMEI information, the first IMSI information preferably after md5 encryption and the first IMEI information.
Step 203, server searches bound User ID according to the first IMSI and the first IMEI;
Specifically, server receives after destroying query messages, pass through the first IMSI information carried in message and first
IMEI Information Authentication binding relationships find the corresponding User ID of terminal, and in PTT_ after verification is legal by binding relationship
Search whether that record is asked in the destruction for destroying the user by User ID in HEAP.YongHu_Record tables.
Step 204, server finds the first User ID in lists, by the User ID preserved in list corresponding second
IMSI, and encrypted 2nd IMSI is sent to mobile terminal;
Step 205, mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then moves
Dynamic terminal is destroyed.
Specifically, when mobile terminal obtains the destruction confirmation message KILL_USR_CNF_MSG of server return, judge to take
After whether the second IMSI information after md5 encryption of the mobile phone destroyed carried in business device return message encrypts with existing equipment
The first IMSI it is consistent, if it is equal and destroy flag bit be 1, start Shredding Process.
The information deletion that exactly will locally preserve is destroyed, such as deletes the information in database file, is emptied
All variables (including user account, password, IMEI, IMSI, setting option) that SharedPreferences is preserved, then by pin
It ruins mark destroy and is set as true, be saved into SharedPreferences.
If network is normal, the software destruction time is sent to server.Current process is killed, and be currently running
View layers, service layer processes.
If next time wishes to log on, it can prompt that " software self-destruction, is reinstalled after please unloading!",
It will be unable to enter this application, software is forbidden to use.
The destroying method of the present invention can be carried out easily using local detection from destruction, or be started using server side
It destroys, the information destroying that mobile terminal is preserved, so as to be effectively protected the information security of mobile terminal.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure
Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate
The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description.
These functions are implemented in hardware or software actually, depend on the specific application and design constraint of technical solution.
Professional technician can use different methods to achieve the described function each specific application, but this realization
It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can use hardware, processor to execute
The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described specific implementation mode has carried out further the purpose of the present invention, technical solution and advantageous effect
It is described in detail, it should be understood that the foregoing is merely the specific implementation mode of the present invention, is not intended to limit the present invention
Protection domain, all within the spirits and principles of the present invention, any modification, equivalent substitution, improvement and etc. done should all include
Within protection scope of the present invention.
Claims (10)
1. a kind of destroying method, which is characterized in that the method includes:
After user is successfully logged in for the first time by mobile terminal, by the First International mobile device identification code IMEI of the mobile terminal
It is stored in local with First International mobile identification number IMSI, and the first broadcast is added to alarm clock and manages AlarmManager
In timer and broadcast first broadcast;
Variable, which will be successfully logged in, when user is switched on is set as true;
The radio receiver of mobile terminal receives first broadcast, starts the service of destruction;
After booting, the radio receiver receives the booting self-starting broadcast of system transmission;
Judge whether the successfully login variable is true, then sends the second broadcast in this way;
When the radio receiver receives second broadcast, client identification module SIM in the mobile terminal is monitored;
If None- identified to the SIM, or the 2nd IMEI of the mobile terminal that gets with locally preserve it is described
First IMEI is inconsistent, or the 2nd IMSI got and the first IMSI locally preserved inconsistent then described mobile whole
It is destroyed at end.
2. according to the method described in claim 1, it is characterized in that, second broadcast of then transmission in this way specifically includes:By institute
It states the second broadcast to be added in alarm clock management timer, second broadcast is sent with first time interval.
3. according to the method described in claim 1, it is characterized in that, the mobile terminal destroy specifically including:Institute
State the information deletion that mobile terminal will be preserved locally.
4. according to the method described in claim 1, it is characterized in that, the method further includes:The mobile terminal will be destroyed and be marked
Will is set as true, and will destroy the time and be sent to the server.
5. a kind of destroying method, which is characterized in that the method includes:
Server receives destruction and asks and preserve in lists, and destructions request includes User ID, the User ID and
User password, IMIS with IMEI phases are bound;
Mobile terminal judges that it is no to destroy mark, sends to the server and destroys query messages, in the destruction query messages
Including the first IMSI of the mobile terminal and the first IMEI;
The server searches bound User ID according to the first IMSI and the first IMEI;
The server finds the first User ID in the list, and the User ID preserved in the list is corresponding
2nd IMSI, and encrypted 2nd IMSI is sent to the mobile terminal;
The mobile terminal judges that encrypted 2nd IMSI is consistent with local encrypted first IMSI, then the shifting
Dynamic terminal is destroyed.
6. according to the method described in claim 5, it is characterized in that, the server receives destruction request and is stored in list
In after further include setting the User ID to destruction state.
7. according to the method described in claim 5, it is characterized in that, the mobile terminal destroyed query messages and include
The first IMSI and the first IMEI be specially encrypted first IMSI and encrypted first IMEI.
8. according to the method described in claim 5, it is characterized in that, the server is according to the first IMSI and the first IMEI
Further include whether legal verifying the first IMSI and the first IMEI before searching bound User ID.
9. according to the method described in claim 5, it is characterized in that, the mobile terminal destroy specifically including:Institute
State the information deletion that mobile terminal will be preserved locally.
10. according to the method described in claim 5, it is characterized in that, the method further includes:The mobile terminal will be destroyed and be marked
Will is set as true, and will destroy the time and be sent to the server.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410406620.5A CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410406620.5A CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105451224A CN105451224A (en) | 2016-03-30 |
CN105451224B true CN105451224B (en) | 2018-09-28 |
Family
ID=55560918
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410406620.5A Active CN105451224B (en) | 2014-08-18 | 2014-08-18 | Destroying method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105451224B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101674583A (en) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | Method for hiding or recovering personal information when changing SIM card and system thereof |
EP2357859B1 (en) * | 2008-11-27 | 2013-06-19 | ZTE Corporation | An authentication method for the mobile terminal and a system thereof |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
-
2014
- 2014-08-18 CN CN201410406620.5A patent/CN105451224B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2357859B1 (en) * | 2008-11-27 | 2013-06-19 | ZTE Corporation | An authentication method for the mobile terminal and a system thereof |
CN101674583A (en) * | 2009-08-25 | 2010-03-17 | 联信摩贝软件(北京)有限公司 | Method for hiding or recovering personal information when changing SIM card and system thereof |
CN103634477A (en) * | 2013-12-11 | 2014-03-12 | 深圳市亚略特生物识别科技有限公司 | Method and system for preventing thievery of mobile phone with fingerprint device |
Also Published As
Publication number | Publication date |
---|---|
CN105451224A (en) | 2016-03-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9325704B2 (en) | Data access method and device | |
US9906513B2 (en) | Network authorization system | |
CN104540123B (en) | The method and system of mobile terminal significant data encrypted backup and safety deleting | |
CN100358303C (en) | A method for monitoring apparatus being managed | |
CN104468611A (en) | Data security processing method and device based on dual-system switching | |
US20140380052A1 (en) | Message filtering method and system | |
US11714914B2 (en) | Secure storage of passwords | |
CN104035891B (en) | Android mobile terminal data security protection system | |
CN108875373B (en) | Mobile storage medium file control method, device and system and electronic equipment | |
EP1783614A4 (en) | Management service device, backup service device, communication terminal device, and storage medium | |
CN106790056A (en) | Reduce the method and system of the data theft risk of data bank | |
Botha et al. | A comparison of chat applications in terms of security and privacy | |
Mayberry et al. | Who tracks the trackers? circumventing apple's anti-tracking alerts in the find my network | |
Yu et al. | Remotely wiping sensitive data on stolen smartphones | |
US9430638B2 (en) | Authentication method, authentication apparatus and authentication device | |
Rottermanner et al. | Privacy and data protection in smartphone messengers | |
CN107346487A (en) | Data processing method and device | |
CN105099686B (en) | Data synchronous method, server, terminal and system | |
CN105451224B (en) | Destroying method | |
CN106911653B (en) | Method, device, mobile terminal and system for realizing remote control of mobile terminal | |
CN106230802B (en) | A kind of method that account number logs on line | |
CN105516316A (en) | Method for improving information security of smart phone user | |
CN108989298B (en) | Equipment safety monitoring method and device and computer readable storage medium | |
WO2017197689A1 (en) | Sim card processing method and apparatus, terminal, and esam chip | |
CN107509181A (en) | A kind of encryption method of SMS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |